-
Posts
1292 -
Joined
-
Last visited
-
Days Won
10
Everything posted by wvw
-
Eh. In its 2008 Report to Congress, the U.S.-China Economic and Security Review Commission noted that "China's current cyber operations capability is so advanced, it can engage in forms of cyber warfare so sophisticated that the United States may be unable to counteract or even detect the efforts." According to the report, there were some 250 different hacker groups in China that the government tolerated (if not openly encouraged). ???? !!1
-
The more you know: Slashdot | Investigators Replicate Nokia 1100 Banking Hack Ar putea primi o sum? consistent?, dar doar de la anumite persoane.
-
New stuff: Hacking the Human http://rapidshare.com/files/279933203/h_t_h.zip Hacking The Mind 2600 http://netload.in/dateivqTWc1nLY7/HackMind.part1.rar.htm http://netload.in/dateieSWDyIrfsF/HackMind.part2.rar.htm sau http://www.filefactory.com/file/ah2hf5a/n/HackMind_part1_rar http://www.filefactory.com/file/ah2hf4d/n/HackMind_part2_rar sau Hacking The Mind 2600 » Full Software Downloads - Download For All
-
Easy, secure and consolidated free online backup, sync, sharing, access & storage solution for Windows, Mac OS X, and Linux (Ubuntu, Debian & Fedora) https://spideroak.com/ Access all your data in one de-duplicated location Configurable multi-platform synchronization Preserve all historical versions & deleted files Share folders instantly in web ShareRooms w / RSS Retrieve files from any internet-connected device Comprehensive 'zero-knowledge' data encryption 2 GBs Free / $10 per 100 GBs / Unlimited devices
-
Bun? ini?iativa. F?r? englez? e?ti mort în ap?. Mai ales în (orice ?ine de) IT. P.S. 4. If you don't have functional English, learn it
-
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found unusual solutions for writing secure code, designing secure applications, addressing modern challenges such as wireless security and Internet vulnerabilities, and much more. Among the book's wide-ranging topics, you'll learn how new and more aggressive security measures work--and where they will lead us. Topics include: Rewiring the expectations and assumptions of organizations regarding security Security as a design requirement Evolution and new projects in Web of Trust Legal sanctions to enforce security precautions An encryption/hash system for protecting user data The criminal economy for stolen information Detecting attacks through context Go beyond the headlines, hype, and hearsay. With Beautiful Security, you'll delve into the techniques, technology, ethics, and laws at the center of the biggest revolution in the history of network security. It's a useful and far-reaching discussion you can't afford to miss. http://www.megaupload.com/?d=LSF5I8PJ
-
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors. You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them. Learn how "inside out" techniques can poke holes into protected networks Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited Prevent attacks against the mobile workforce and their devices containing valuable data Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations http://www.megaupload.com/?d=5ADEV2VI
-
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover them at all. Now there’s a book that brings together start-to-finish information about today’s most widespread chained exploits–both how to perform them and how to prevent them. Chained Exploits demonstrates this advanced hacking attack technique through detailed examples that reflect real-world attack strategies, use today’s most common attack tools, and focus on actual high-value targets, including credit card and healthcare data. Relentlessly thorough and realistic, this book covers the full spectrum of attack avenues, from wireless networks to physical access and social engineering. Writing for security, network, and other IT professionals, the authors take you through each attack, one step at a time, and then introduce today’s most effective countermeasures— both technical and human. Coverage includes: Constructing convincing new phishing attacks Discovering which sites other Web users are visiting Wreaking havoc on IT security via wireless networks Disrupting competitors’ Web sites Performing–and preventing–corporate espionage Destroying secure files Gaining access to private healthcare records Attacking the viewers of social networking pages Creating entirely new exploits and more http://rapidshare.com/files/243251718/032149881X.zip
-
With the growing prevalence of the Internet, rootkit technology has taken center stage in the battle between White Hats and Black Hats. Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so, the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented. http://rapidshare.com/files/277943710/1598220616.rar.html Un review aici: Security Blog by Nagareshwar Blog Archive Book of the Month : The Rookit ARSENAL ?i ca bonus - Rootkits: Subverting the Windows Kernel http://www.megaupload.com/?d=DPX4YW1C
-
milw0rm is your friend SunOS 5.10 Remote ICMP Kernel Crash Exploit SunOS 5.10 Sun Cluster rpc.metad Denial of Service PoC milw0rm - exploits : vulnerabilities : videos : papers : shellcode
-
Buba cu Slackware este în continuare package management-ul. E un LFS mai prietenos. Trebuie s? ai mult? r?bdare cu a?a ceva. Pierzi mult timp pân? când ?i-l customizezi dup? bunul plac, dar înve?i multe pe parcurs.
-
?i astea: Reddit Science (link previzibil) Gyre.org | Tracking the Next Military and Technological Revolutions Science News - The New York Times ScienceBlogs
-
Recomand: AvaxHome -> Complete Scientific American Issues 1993 - October 2008 + Complete Special Editions, Presents and Mind + Exclusive Online Edi ?i Data on AvaxHome
-
Topic Reuse ftw http://rstcenter.com/forum/14343-ce-linux-imi-recomandati.rst Sau NetBSD. Tot pe acolo
-
Ubuntu sau Mint sau Fedora Core sau openSUSE. ?i mai departe?
-
N?, n?. ?i cui vrei s?-i vii de hack?
-
We live in the data age. It’s not easy to measure the total volume of data stored elec- tronically, but an IDC estimate put the size of the "digital universe" at 0.18 zettabytes in 2006, and is forecasting a tenfold growth by 2011 to 1.8 zettabytes . A zettabyte is 10^21 bytes, or equivalently one thousand exabytes, one million petabytes, or one billion terabytes. That's roughly the same order of magnitude as one disk drive for every person in the world. This flood of data is coming from many sources. Consider the following: • The New York Stock Exchange generates about one terabyte of new trade data per day. • Facebook hosts approximately 10 billion photos, taking up one petabyte of storage. • Ancestry.com, the genealogy site, stores around 2.5 petabytes of data. • The Internet Archive stores around 2 petabytes of data, and is growing at a rate of 20 terabytes per month. • The Large Hadron Collider near Geneva, Switzerland, will produce about 15 petabytes of data per year. http://www.emc.com/collateral/analyst-reports/diverse-exploding-digital-universe.pdf Fragment luat din "Hadoop The Definitive Guide" http://rapidshare.com/files/242828981/oreihadop.rar
-
E destul de piperat costul. Deci, Google s? tr?iasc?. Mai ales când ?tii ce cau?i. Mai devreme am dat de Do You Belong To The Black Hat Monkeys Community? | Diary of a Black Hat SEO c?utând ceva despre "language mutation".
-
Ceva de genul SEO Black Hat SEO Forum ?
-
Piesa se nume?te "Roll up, roll up" ?i o po?i g?si pe compila?ia Hip Hop Mh10. Gracenote: Album > Music House International - Hip Hop Mh10 Versurile aici: mmg music
-
Argumentul meu preferat - Python este unul dintre "limbajele Google" ( al?turi de C++, Java ?i Javascript). Nota bene: What is Python Bad For? Deci, pentru restul se folose?te C.
-
Înva?? C. Este un limbaj fundamental. ?i Python, pentru scripting ?i "code glue" ;-)